Book Image

Implementing Multifactor Authentication

By : Marco Fanti
Book Image

Implementing Multifactor Authentication

By: Marco Fanti

Overview of this book

MFA has emerged as an essential defense strategy in the wide-ranging landscape of cybersecurity. This book is a comprehensive manual that assists you in picking, implementing, and resolving issues with various authentication products that support MFA. It will guide you to bolster application security without sacrificing the user experience. You'll start with the fundamentals of authentication and the significance of MFA to familiarize yourself with how MFA works and the various types of solutions currently available. As you progress through the chapters, you'll learn how to choose the proper MFA setup to provide the right combination of security and user experience. The book then takes you through methods hackers use to bypass MFA and measures to safeguard your applications. After familiarizing yourself with enabling and managing leading cloud and on-premise MFA solutions, you’ll see how MFA efficiently curbs cyber threats, aided by insights from industry best practices and lessons from real-world experiences. Finally, you’ll explore the significance of innovative advancements in this domain, including behavioral biometrics and passkeys. By the end of the book, you'll have the knowledge to secure your workforce and customers, empowering your organization to combat authentication fraud.
Table of Contents (20 chapters)
1
Part 1: Introduction
4
Part 2: Implementing Multifactor Authentication
12
Part 3: Proven Implementation Strategies and Deploying Cutting-Edge Technologies

Experiencing Ping Identity’s PingFederate

PingFederate from Ping Identity provides SSO, federated identity management (FIM), and customer identity and access management (CIAM). PingFederate can extend employee, customer, and partner identities across domains without passwords. SAML, WS-Federation, and OAuth are some of the identity standard protocols used in PingFederate.

More information about the standards used in PingFederate can be found at the following links:

  • SAML: http://docs.oasis-open.org/security/saml/Post2.0/sstc-saml-tech-overview-2.0.html
  • WS-Federation: http://docs.oasis-open.org/wsfed/federation/v1.2/os/ws-federation-1.2-spec-os.html
  • OAuth: https://oauth.net/2/
  • OpenID Connect: https://openid.net/connect/

Before we can install PingFederate, we need to install the Java SDK. Instructions to install Java SDK version 11 can be found in Appendix A.

Installing PingFederate

We will start off by downloading and installing PingFederate...